Steganography in Greek means covered or secret writing and is a long practiced form of hiding information. (Westphal, 2003)Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step farther by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data.

As I mention before: Steganography is the process of hiding a message, while cryptography is the process of hiding its meaning. Examples of both are given with information on how the codes are used, and how they were broken. The main example is Mary Queen of Scot's code, the weakness of which led to her execution.

Steganography was used as recently as 2001 as told by the U.S. officials. They say that hidden in the pictures on several Web sites and the posted comments on sports chat rooms may lie the encrypted blueprints of the next terrorist attack against the United States or its allies.

Steganography

English: Steganography: the Third Protection Level...

English: Steganography: the Fourth Protection Leve...

Steganography includes a vast array of techniques for hiding messages in a variety of media like text, images, sound. In text, messages hidden in the form of particular indentation like line shifting, vertical spacing etc. (Kessler, 2001)Type of Steganography:1- In text:- Line-Shifting Coding: The text lines are vertically shifted to encode the document uniquely. If a document is marked with line-shift coding, it is particularly difficult to remove the encoding if the document is in paper format. (Kessler, 2001)- Word-Shift Coding: In word shifting coding, code words are coded into a document by shifting the horizontal locations of words within text lines, while maintaining a natural spacing appearance.

More Computer Ethics essays:

... of flesh for what they believe is missed revenue dollars that could be made in the form of tax regulations. 'There are probably insiders touting stocks on the Internet either anonymously or under assumed names,' said Mary Schapiro , president of the National Association of ...

... Data Protection Act ? The 1998 Act states: ?1. Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless- (a) at least one of the conditions in Schedule 2 is met, and (b) in the case of sensitive personal data, at least one of ...

... message I sent them is a smaller version of this one: 'To whom it may concern, I am writing to you about the Communications Decency Act. I believe the act is unconstitutional. Amendment I states: 'Congress shall make no law......abridging the freedom of ...

... Internet has caused one of these situations. There is information on the Internet about everything from drugs to making bombs. The United States government is ... about themselves that can be sold to marketers and distributed to data bases throughout the world. When people use the world-wide web, ...

6 pages4533May/19961.9

Students & Profs. say about us:

"Good news: you can turn to other's writing help. WriteWork has over 100,000 sample papers"